Management and Security Good Practice Guide. August 2009

Size: px
Start display at page:

Download "Email Management and Security Good Practice Guide. August 2009"

Transcription

1 Management and Security Good Practice Guide August 2009

2 contents 1 Introduction to Good Practice Guides 3 2 Management and Security Overview Understanding Good and Better Practice 4 3 Management and Security Good Practice Mobile Device s 7 4 Management and Security Better Practice Encryption of s 7 5 Appendix A: Definitions 8 6 Appendix B: Checklists Good Practice Checklist 8 7 Document Control 10 VERSION: AUGUST

3 1 INTRODUCTION TO GOOD PRACTICE GUIDES This document is a good practice guide concerning the secure use and management of within the various international agricultural research centers that are supported by the Consultative Group for International Agricultural Research (CGIAR). This guide forms part of the CGIAR-wide baseline ICT Security and Acceptable Use good practice set. The target audience for the good practice guides are all centers affiliated with CGIAR, and in particular, the IT teams within each center. The good practice set does not contain mandatory requirements that centers are required to implement. Instead, it outlines a number of good practices with respect to enterprise ICT security and acceptable use. The prudence of implementing specific good practices identified in this guide will depend on the risk profile associated with the ICT environment in each center. A set of checklists is provided at the end of this guide to assist with the process of determining those good practices which will be relevant depending on the risk profile of each center. The initial ICT Security and Acceptable Use good practice set has been prepared in consultation with the CGIAR center IT community under a process jointly managed by the CGIAR ICTKM Program and the CGIAR Internal Auditing Unit (IAU). This guide draws on the results of work undertaken in the CGIAR Enterprise Security and Business Continuity Project; additional inputs from the IT community, internal auditors, and from SIFT Pty Ltd, an information security and risk management services firm which assisted in the preparation of these guides. The ICTKM and IAU units will coordinate future updates in consultation with the CGIAR center IT community. 2 MANAGEMENT AND SECURITY OVERVIEW Engaging in good practices with regard to the security management of is crucial whilst the use of e- mail as a medium of communication has become ubiquitous, it is inherently an insecure form of communication. s can be easily intercepted and read by those determined to know their content. While much of the work of the CGIAR centers is inherently of a public good nature, there will be many cases where information is of a nature that it should be closely held by a center, either indefinitely or for a certain period of time. For this reason, it is imperative that sensitive information is not sent or received via by staff within CGIAR centers unless regard is had to the good practices identified in this document. Specific risks that may eventuate if usage and security is not managed properly include: Unauthorised information disclosure The use of within CGIAR centers introduces the risk of both accidental and malicious information disclosure through: Mismanaged recipient lists that result in the unintended delivery of s to certain 3rd parties; Eavesdropping attacks in which a fraudulent party is able to intercept and examine the contents of s containing sensitive information; or Deliberate or accidental forwarding by staff of sensitive information such as research-in-progress, and private, personal, or financial data. Viruses and unrestricted active content Infection and the propagation of a virus, worm or other form of malicious software via may compromise the confidentiality of data stored, processed or transmitted on computers located within CGIAR centers, and may lead to further infections within CGIAR ICT networks. Loss of network availability - The availability of CGIAR networks can be impaired if unauthorised broadcast messages or self-propagating messages are sent or received, such as though bombing or spam. Legal liability - CGIAR centers may be legally liable if staff send inappropriate, misleading or incorrect information using . VERSION: AUGUST

4 2.1 Understanding Good and Better Practice Although this document predominantly contains good practices for management and security, these are also supplemented by a number of guidelines which provide for a higher level of security, considered better or best practice. The difference between good and better practice in the context of CGIAR centers is defined below: Good Practice - An appropriate set of security controls for most CGIAR centers. Focus is applied to the use of technologies which are already likely to be in place, and an attempt is made to minimise the complexity of the solutions and the management overhead of the environment. Better Practice - A higher standard, to provide further guidance to CGIAR centers who have identified their systems or networks as being at an increased risk of attack, where more sensitive information and systems are housed, and where additional resources are available. The systems and all information contained in the systems (for example, messages, document attachments, access logs, etc.) are the property of CGIAR centers. Hence, it is important to ensure that those systems and information are managed in accordance with the good practices in this guide in order to mitigate any potential security threats. VERSION: AUGUST

5 3 MANAGEMENT AND SECURITY GOOD PRACTICE For controls listed below which include surveillance measures, it is the responsibility of individual centers to research and maintain awareness of the legal, regulatory and compliance environments which surround workplace surveillance and monitoring in their respective host countries (including state or provinces where such level of regulation is in place). There may be restrictions in place or requirements that must be fulfilled prior to any surveillance activity, such as notification of the users or staff to be monitored, and restrictions on monitoring of data in transit. Examples of such legislation include the Electronic Communications Privacy Act (USA) and the Workplace Surveillance Act (NSW, Australia) It is recommended for CGIAR centers to maintain a policy statement which reserves the right to record, store and inspect all communications and logs of such communications. Logs of communications should capture the following information: Sender All receivers Subject or title Filenames of any attached files Partial message content (first 200 characters) CGIAR centers should maintain a policy of notifying account users about their surveillance and monitoring controls and practices. These should include the center s right to be able to monitor, search, review, disclose, or intercept information contained in center owned systems (such as messages, document attachments and access logs) for legitimate purposes such as: monitoring performance ensuring compliance with the policies of the center detecting and preventing misuse of the systems troubleshooting hardware and software problems complying with legal and regulatory requests for information investigating disclosure of confidential research, proprietary information, or conduct that may be illegal or adversely affect the center or its associates. An example of how a data investigation process could be carried out is detailed below: a) An IT manager is allowed to perform the investigation, but only with the approval of at least two senior managers from the senior management group of the Center. b) The person concerned must be informed, unless the inspection relates to a criminal or potentially criminal matter. c) No other staff can perform investigation actions even if delegated by the approved IT Manager unless protocol a) and b) of this process have occurred for the staff member. d) A system-enforced audit trail should be maintained to allow the investigation process to be reconstructed if required. VERSION: AUGUST

6 3.1.3 It is recommended CGIAR centers maintain a policy which requires that every message that passes through their systems is scanned to check for computer viruses, worms, or other executable items that could pose a threat to the security of the center s network and data. Infected messages should not be delivered to the user It is recommended CGIAR centers maintain a policy which requires that every message that passes through CGIAR systems is scanned to check its contents based on predetermined criteria, such as the following: Bad SMTP headers Invalidated source IP addresses Bad domain names Spam The use of offensive language (in this case profanities) Attachments containing inappropriate or malicious material (including viruses, worms and trojans) If the message does not pass the criteria, the message should not be delivered to the user and the system administrator should receive an automatic alert. Note that gateway anti-virus inspection software should be sourced from a different vendor from the vendor used to supply end-user anti-virus software It is recommended that CGIAR centers maintain a policy which requires that users only use software and systems for accessing services that have been approved for use by the CGIAR center in question It is recommended that CGIAR maintain a policy which requires retention and archiving of all incoming and outgoing messages, including attachments, which pass through systems. Administrators should archive messages to an off-line storage medium at least every six months and purge those messages from the on-line storage medium, however this period can be modified if required to comply with the relevant regulations of the hosting country (which will generally be the country in which the mail server is located) Centers should establish a retention period for archived messages stored off line in accordance with the laws of the relevant host country (which will generally be the country in which the mail server is located) as well as any other Center or CGIAR-wide requirements included in a broader policy on records management It is recommended that CGIAR centers maintain a policy which states a maximum storage capacity determined and enforced by that center. The maximum storage capacity will depend on the available resources of each center. A process of documenting and managing exception to the maximum storage capacity for individuals based on appropriate justification should be put in place in each CGIAR center It is recommended that CGIAR centers maintain a policy which prohibits automatic forwarding of messages from CGIAR accounts to any untrusted addresses except for legitimate purposes specifically approved by the IT manager or the HR Unit (such as in cases of departing staff) servers should be configured in a manner which helps reduce the chances of centre addresses being added to blacklists. CGIAR should maintain a policy which includes the following controls to support this requirement: a) Ensure that the identity of each center mail server within the internal infrastructure correctly identifies itself to other connecting mail servers. At a technical level, this is generally implemented through ensuring that the fully qualified domain name used by the mail server to VERSION: AUGUST

7 identify itself across the Internet is the same as the fully qualified domain name that is specified for the MX record and the DNS hosting provider for each center. b) Ensure that center s cannot be relayed externally. c) Ensure that systems and workstations are and remain malware free. 3.2 Mobile Device s Mobile devices such as laptops, smart phones, PDAs and other devices can be utilised for . While these devices are convenient, they require additional security controls to minimise any introduced risks It is recommended that center policies and orientation material should encourage users to avoid opening and sending s in situations where the security of a mobile devices network connection is unknown (for example, public wireless networks or Internet cafes), unless encrypted or secured connections are utilised between the device and servers. 4 MANAGEMENT AND SECURITY BETTER PRACTICE 4.1 Encryption of s A number of solutions exist for the encryption of . For centers with the resources and technical capability, center policies should require use of a gateway solution (such as Tumbleweed MailGate or PGP Universal) that utilises strong PKI and digital certificate architecture. For other centers, a point solution is recommended such as PGP Desktop For web based access, any form of encryption (such as SSL) configured correctly that is interoperable with internal gateways can be utilised When accessing services using connections such as POP and IMAP access, center policies should require encryption via SSL. VERSION: AUGUST

8 5 APPENDIX A: DEFINITIONS Domain names: Refers to a name (for example, test.com) that is used to represent an IP address or a set of IP addresses. The electronic transmission of information through a mail protocol such as Simple Mail Transport Protocol (SMTP). s can be sent in either HTML or plain-text format. systems: The network components and the software that allow transmission of electronic messages. These include the server, the gateways, routers, as well as client applications. Encryption: Refers to the process of encoding s using a specific algorithm to ensure the contents is unreadable to everyone except the sender and intended recipient of the message. encryption is often achieved using public/private key cryptography through software such as PGP (Pretty Good Privacy). Mailing list: Refers to a list of addresses identified by a single address. When an message is sent to the mailing list address, it is automatically forwarded to all the addresses in the list. Sensitive Information: Information assets classified as restricted, confidential or for internal use. Signature: signatures can refer to one of two concepts: firstly, the generation of a hash of a message that uniquely identifies the sender of the message and proves to the recipient that the message has not been altered during transmission. It can also refer to the consistent addition of certain information to the text of all messages, such as names, addresses, and phone numbers. SMTP headers: SMTP (Simple Mail Transfer Protocol) is used to send messages on the Internet between servers and from a mail client to a mail server. The SMTP header refers to text automatically inserted at the beginning of an message by client mail programs and added to by all the mail servers en route to the destination. Each node adds more text, including from/to addresses, subject, content type, time stamp and identification data, which allows the path of the message from source to destination to be tracked. Spam: The sending of unsoliticed s, often advertising a product or service or containing malicious file attachments. Spam s are often sent in bulk to a large number of addresses that may be harvested using a variety of techniques. Viruses: An unauthorized program that replicates itself, attaches itself to other programs and spreads onto various data storage media or across the network. The symptoms of virus infection include much slower computer response time, inexplicable loss of files, changed modification data for files, increased file sizes, and a possible total failure of the infected computer. 6 APPENDIX B: CHECKLISTS The following checklist is designed to assist CGIAR centers that wish to adopt any or all of the good and better practices listed in this document. The checklists should be used by a center when attempting to assess their level of current adherence with the guidelines listed in this document. This will allow any gaps with good practices to be identified, after which centers can assess whether addressing those gaps will be feasible. 6.1 Good Practice Checklist Guideline Number Guideline Tick if center currently adheres to this guideline VERSION: AUGUST

9 Guideline Number Guideline Tick if center currently adheres to this guideline Section 3 Management and Security Good Practice Section 3.1 management Centers reserve right to record/store/ s Logs of communications capture appropriate information Centers able to monitor/search/review/disclose/intercept information contained in systems (subject to legal/compliance/regulatory environments) s subjected to scanning for viruses/worms/malicious executable files Infected s not delivered to user s subjected to appropriate scanning based on identified criteria Messages failing to pass criteria not delivered, and system administrator alerted Only approved software/systems for accessing used Center retains and archives all messages Messages archived to off line storage every 6 months (or another appropriate period) and purged from on line storage s retained for at least two years Users allowed a maximum storage capacity determined by each center Process in place for documenting and managing exceptions to maximum storage capacity Automatic forwarding of messages from CGIAR accounts to any untrusted addresses be prohibited a Ensure that the identity of each center mail server within the internal infrastructure correctly identifies itself to other connecting mail servers b Ensure that center s cannot be relayed externally c Ensure that systems and workstations are and remain malware free Section 3.2 Mobile Device Encrypted or secured connections utilised for mobile device connections VERSION: AUGUST

10 Guideline Number Guideline Tick if center currently adheres to this guideline Section 4 Management Better Practice Section 4.1 Encryption of s encryption should be implemented either with a gateway solution or a point solution Web based access should utilise encryption such as SSL Connections to services such as POP and IMAP should be encrypted using SSL 7 DOCUMENT CONTROL Version Control Log Version Description Date 1.00 Third revision from client feedback 19 Jun First published edition 24 Aug 2009 Copyright & Legal This guideline, prepared specifically for Consultative Group for International Agricultural Research, is the intellectual property of SIFT Pty Limited. When finalised, SIFT Pty Limited authorises CGIAR to reproduce or disseminate this guideline as necessary to further the aims and goals of CGIAR, under a Creative Commons Attribution-Noncommercial-Share Alike 2.5 Australia License In no event shall SIFT Pty Limited be liable to anyone for special, incidental, collateral, or consequential damages arising out of the use of this information. SIFT is a Registered Trademark of SIFT Pty Ltd. Many designations used by manufacturers and sellers to distinguish their products are claimed as trademarks or other proprietary rights. Where designations appear, and when the editorial staff were aware of a claim, the designations have been shown. Other trademarks, registered trademarks, and service marks are the property of their respective owners. Copyright 2009 SIFT Pty Limited. Originated in Australia. The first published version provided by SIFT Pty Limited, and future versions with modifications made by the CGIAR, as coordinated through the CGIAR ICTKM Program and the CGIAR Internal Auditing Unit, are being distributed by these Units in accordance with the terms of the above license, which can be found at VERSION: AUGUST

Internet Security Good Practice Guide. August 2009

Internet Security Good Practice Guide. August 2009 Internet Security Good Practice Guide August 2009 contents 1 Introduction to Good Practice Guides 3 2 Internet Security Overview 3 3 Internet Security Good Practice Guidelines 4 4 Appendix A: Definitions

More information

Good Practice Set For ICT Security and Acceptable Use

Good Practice Set For ICT Security and Acceptable Use Sensible Use of Bandwidth Good Practice Guide August 2009 contents 1 Introduction to Good Practice Guides 3 2 Sensible Use of Bandwidth Overview 3 3 Applicability of Sensible Use of Bandwidth Good Practice

More information

Internet and Email Acceptable Usage Good Practice Guide. August 2009

Internet and Email Acceptable Usage Good Practice Guide. August 2009 Internet and Email Acceptable Usage Good Practice Guide August 2009 contents 1 Introduction to Good Practice Guides 3 2 Acceptable Internet and Email Usage Overview 3 3 Acceptable Internet Usage Good Practice

More information

Network Infrastructure Security Good Practice Guide. August 2009

Network Infrastructure Security Good Practice Guide. August 2009 Network Infrastructure Security Good Practice Guide August 2009 contents figures 1 Introduction to Good Practice Guides 3 2 Network Infrastructure Security Overview 3 2.1 Understanding Good and Better

More information

Acceptable Usage Policy

Acceptable Usage Policy Contents 1. INTRODUCTION... 2 2. PURPOSE... 2 3. APPLICATION... 2 4. YOUR OBLIGATIONS AND PROHIBITED USE... 2 5. SPAM... 3 6. EXCESSIVE USE... 3 7. SECURITY... 4 8. COPYRIGHT... 4 9. CONTENT... 4 10. REGULARTORY

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance

More information

ACCEPTABLE USAGE PLOICY

ACCEPTABLE USAGE PLOICY ACCEPTABLE USAGE PLOICY Business Terms - February 2012 ACCEPTABLE USAGE POLICY Business Terms Version February 2012 Acceptable Usage Policy Feb12.Docx 1 Contents 1. INTRODUCTION... 3 2. PURPOSE... 3 3.

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Acceptable Usage Policy

Acceptable Usage Policy Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...

More information

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

INSTANT MESSAGING SECURITY

INSTANT MESSAGING SECURITY INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

PCI DSS Requirements - Security Controls and Processes

PCI DSS Requirements - Security Controls and Processes 1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data

More information

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012 Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention

More information

Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator

Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator POLICIES AND PROCEDURES NEW JERSEY EARLY INTERVENTION SYSTEM No: NJEIS-17 Subject: Computers & Electronic Records Effective Date: May 1, 2011 Responsible Party: Part C Coordinator I. Purpose To protect

More information

CITRUS COMMUNITY COLLEGE DISTRICT GENERAL INSTITUTION ELECTRONIC MAIL AND BULK ELECTRONIC DISTRIBUTION

CITRUS COMMUNITY COLLEGE DISTRICT GENERAL INSTITUTION ELECTRONIC MAIL AND BULK ELECTRONIC DISTRIBUTION CITRUS COMMUNITY COLLEGE DISTRICT GENERAL INSTITUTION AP 3723 ELECTRONIC MAIL AND BULK ELECTRONIC DISTRIBUTION 1.0 Purpose Citrus Community College District electronic mail (email) services support the

More information

Broadband Acceptable Use Policy

Broadband Acceptable Use Policy Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2

More information

How To Use A College Computer System Safely

How To Use A College Computer System Safely 1.0 Overview Keuka College provides access to modern information technology in support of its mission to promote excellence and achievement across its mission areas of instruction, research, and service.

More information

region16.net Acceptable Use Policy ( AUP )

region16.net Acceptable Use Policy ( AUP ) region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

March 2012 www.tufin.com

March 2012 www.tufin.com SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...

More information

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Information Security and Electronic Communications Acceptable Use Policy (AUP) Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

Service Schedule for Business Email Lite powered by Microsoft Office 365

Service Schedule for Business Email Lite powered by Microsoft Office 365 Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND

More information

Why you need secure email

Why you need secure email Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with

More information

Service Protection Under The Provider's Acceptable Use Policy

Service Protection Under The Provider's Acceptable Use Policy Acceptable Use Policy As a provider of Internet access, Internet email, web site hosting, and other Internet related services, Pottawatomie Telephone Company and MBO.net herein after referred to as "the

More information

Acceptable Use and Publishing Policy

Acceptable Use and Publishing Policy 1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy

More information

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy 1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines

More information

Acceptable Use Policy - NBN Services

Acceptable Use Policy - NBN Services OASIS TELECOM ABN: 31 155 359 541 P: 1300 734 399 F: 03 9011 9644 care@oasistelecom.com.au www.oasistelecom.com.au PO Box 6153, Point Cook, VIC - 3030 Acceptable Use Policy - NBN Services Important Note:

More information

Email Policy For Staff and Students

Email Policy For Staff and Students Email Policy For Staff and Students Document Version Date Policy Owner Approval Email Policy V1.2 Dec 2011 ITS Reviewed - KPMG auditor V1.3 Feb 2012 Approved - elit committee March 2012 Approved Management

More information

Southern Law Center Law Center Policy #IT0004. Title: Email Policy

Southern Law Center Law Center Policy #IT0004. Title: Email Policy Southern Law Center Law Center Policy #IT0004 Title: Email Policy Authority: Department Original Adoption: 7/20/2007 Effective Date: 7/20/2007 Last Revision: 9/17/2012 1.0 Purpose: To provide members of

More information

Franciscan University of Steubenville Information Security Policy

Franciscan University of Steubenville Information Security Policy Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,

More information

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012 Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History

More information

13. Acceptable Use Policy

13. Acceptable Use Policy To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information

More information

Service Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365

Service Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION 1.1 The Service enables the Customer to: set up a web site(s); create a sub-domain name associated with the web site; create email addresses. 1.2 The email element of the Service

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for

More information

U06 IT Infrastructure Policy

U06 IT Infrastructure Policy Dartmoor National Park Authority U06 IT Infrastructure Policy June 2010 This document is copyright to Dartmoor National Park Authority and should not be used or adapted for any purpose without the agreement

More information

FTA Computer Security Workshop. Secure Email

FTA Computer Security Workshop. Secure Email FTA Computer Security Workshop Secure Email March 8, 2007 Stan Wiechert, KDOR IS Security Officer Outline of Presentation The Risks associated with Email Business Constraints Secure Email Features Some

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

SPAM FILTER Service Data Sheet

SPAM FILTER Service Data Sheet Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic

More information

REGION 19 HEAD START. Acceptable Use Policy

REGION 19 HEAD START. Acceptable Use Policy REGION 19 HEAD START Acceptable Use Policy 1.0 Overview Research, Evaluation, Assessment and Information Systems (R.E.A.I.S.) intentions for publishing an Acceptable Use Policy are not to impose restrictions

More information

Information Security Policy

Information Security Policy Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview Nicholas Financial Inc. s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Nicholas Financial s established culture

More information

Appendix G District Email Policies and Procedures

Appendix G District Email Policies and Procedures Appendix G District Email Policies and Procedures I. Introduction Email has become one of the most used communications tools in both homes and work places and is now an integral part of all Joshua ISD

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

Network Security Policy

Network Security Policy Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus

More information

PART D NETWORK SERVICES

PART D NETWORK SERVICES CONTENTS 1 ABOUT THIS PART... 2 2 PUBLIC NETWORK... 2 Internet... 2 3 PRIVATE NETWORK... 3 Global WAN services... 3 4 SECURITY SERVICES... 3 Firewall... 4 Intrusion Prevention (Network)... 5 SSL/IPSEC

More information

Cablelynx Acceptable Use Policy

Cablelynx Acceptable Use Policy Cablelynx provides a variety of Internet Services (the Services) to both residential and business customers (the Customer). Below, you will find the terms and conditions that you agree to by subscribing

More information

Nova ADSL Broadband Service Application Form

Nova ADSL Broadband Service Application Form Nova ADSL Broadband Service Application Form User ID (your access login; in lowercase, no more than 30 characters & no punctuation): Contact: Surname: Given Name: Company (optional): Charge Company Address:

More information

FKCC AUP/LOCAL AUTHORITY

FKCC AUP/LOCAL AUTHORITY FKCC AUP/LOCAL AUTHORITY The information contained in this section has its basis in Public Law 93.380. It is further enhanced however, by Florida State Board of Education Administrative Rule 6A-14.51 and

More information

ICT Student Usage Policy

ICT Student Usage Policy ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements

More information

Content Teaching Academy at James Madison University

Content Teaching Academy at James Madison University Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not

More information

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure MANUAL: Hospital Wide SECTION: Information Technology SUBJECT: Acceptable Use of Information Systems Policy IMPLEMENTATION: 01/2011 CONCURRENCE:

More information

How To Protect Unsw Email From Viruses And Spam

How To Protect Unsw Email From Viruses And Spam Policy Name: Approving Authority: Due for Review: UNSW Email Server Policy Chief Information Officer February 2008 Contact Officer: Date of Approval: Last Amended: Jenny Beatson, Policy Officer, UNSW IT

More information

Enterprise K12 Network Security Policy

Enterprise K12 Network Security Policy Enterprise K12 Network Security Policy I. Introduction The K12 State Wide Network was established by MDE and ITS to provide a private network infrastructure for the public K12 educational community. Therefore,

More information

West Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011

West Lothian College. E-Mail and Computer Network Responsible Use Policy. September 2011 West Lothian College E-Mail and Computer Network Responsible Use Policy September 2011 Author: Steve Williams Date: September 2011 Agreed: Computer Network & Email Policy September 2011 E-Mail and Computer

More information

SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE

SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE Directive Concerning the Colorado Judicial Department Electronic Communications Usage Policy: Technical, Security, And System Management Concerns This

More information

IY2760/CS3760: Part 6. IY2760: Part 6

IY2760/CS3760: Part 6. IY2760: Part 6 IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

Guidelines for E-mail Account Management and Effective E-mail Usage

Guidelines for E-mail Account Management and Effective E-mail Usage Guidelines for E-mail Account Management and Effective E-mail Usage October 2014 Version 1.0 Department of Electronics and Information Technology Ministry of Communications and Information Technology Government

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

Acceptable Use Policy

Acceptable Use Policy 1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established culture of openness,

More information

Transport Layer Security (TLS) About TLS

Transport Layer Security (TLS) About TLS Transport Layer Security (TLS) About TLS Contents Secure email at HSBC 2 About Transport Layer Security. 2 Setting up a Forced TLS connection with HSBC 4 Glossary... 5 Support..... 5 Secure email at HSBC

More information

Secure Email Frequently Asked Questions

Secure Email Frequently Asked Questions Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

B R I G H T B Y T E LT D. H O S T I N G T E R M S O F S E R V I C E S

B R I G H T B Y T E LT D. H O S T I N G T E R M S O F S E R V I C E S B R I G H T B Y T E LT D. H O S T I N G TERMS OF SERVICES 1 / 10 BRIGHTBYTE LTD. HOSTING TERMS OF SERVICES 01/01/2014 All services provided by BrightByte Ltd ( BrightByte Ltd ) may be used for lawful purposes

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard

Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard Corporate Policies & Procedures Section 1: General Administration Document

More information

Odessa College Use of Computer Resources Policy Policy Date: November 2010

Odessa College Use of Computer Resources Policy Policy Date: November 2010 Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational

More information

STOWE COMMUNICATIONS ACCEPTABLE USE POLICY FOR BUSINESS SERVICES HIGH SPEED INTERNET

STOWE COMMUNICATIONS ACCEPTABLE USE POLICY FOR BUSINESS SERVICES HIGH SPEED INTERNET STOWE COMMUNICATIONS ACCEPTABLE USE POLICY FOR BUSINESS SERVICES HIGH SPEED INTERNET Contents 1. Prohibited Uses and Activities 2. Customer Conduct and Features of the Service 3. Network Management and

More information

Acceptable Use Policy Revision date: 26/08/2013

Acceptable Use Policy Revision date: 26/08/2013 Acceptable Use Policy Revision date: 26/08/2013 Acceptable usage Policy for all Services As a provider of web site hosting and other Internet-related services, Corgi Tech Limited offers its customer (also

More information

JHSPH Acceptable Use Policy

JHSPH Acceptable Use Policy 1.0 Purpose JHSPH Acceptable Use Policy Use of the Johns Hopkins Bloomberg School of Public Health (JHSPH) information technology (IT) resources is a privilege that is extended to users for the purpose

More information

Top 10 Features: Clearswift SECURE Email Gateway

Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Top 10 Features: Clearswift SECURE Email Gateway Modern business simply couldn t function without email. However, both incoming and outgoing messages can

More information

Responsible Access and Use of Information Technology Resources and Services Policy

Responsible Access and Use of Information Technology Resources and Services Policy Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong

More information

Email Migration Project Plan for Cisco Cloud Email Security

Email Migration Project Plan for Cisco Cloud Email Security Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is

More information

Email Image Control. Administrator Guide

Email Image Control. Administrator Guide Email Image Control Administrator Guide Image Control Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

(Self-Study) Identify How to Protect Your Network Against Viruses

(Self-Study) Identify How to Protect Your Network Against Viruses SECTION 24 (Self-Study) Identify How to Protect Your Network Against Viruses The following objective will be tested: Describe What You Can Do to Prevent a Virus Attack In this section you learn about viruses

More information

Do you need to... Do you need to...

Do you need to... Do you need to... TM Guards your Email. Kills Spam and Viruses. Do you need to... Do you need to... Scan your e-mail traffic for Viruses? Scan your e-mail traffic for Viruses? Reduce time wasted dealing with Spam? Reduce

More information

c. Require or Request Photos of Subscriber f. Allow Subscribers Access to Other Subscriber Information

c. Require or Request Photos of Subscriber f. Allow Subscribers Access to Other Subscriber Information Diocese of Orlando Network Acceptable Use Policy for All Parishes, Schools and Entities of the Diocese of Orlando Parent Addendum (Please note these are excerpts from the full document) 5.3 Unacceptable

More information

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam Government of Canada Managed Security Service (GCMSS) Date: June 8, 2012 TABLE OF CONTENTS 1 ANTISPAM... 1 1.1 QUALITY OF SERVICE...1 1.2 DETECTION AND RESPONSE...1 1.3 MESSAGE HANDLING...2 1.4 CONFIGURATION...2

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy: Executive Summary Texas state law requires that each state agency, including Institutions of Higher Education, have in place an Program (ISP) that is approved by the head of the institution. 1 Governance

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal

More information

Best Practices for PCI DSS V3.0 Network Security Compliance

Best Practices for PCI DSS V3.0 Network Security Compliance Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with

More information

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers

IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy. Notification of Policy Release: Distribution by Communication Managers IM&T POLICY & PROCEDURE (IM&TPP 01) Anti-Virus Policy DOCUMENT INFORMATION Author: Vince Weldon Associate Director of IM&T Approval: Executive This document replaces: IM&T Policy No. 1 Anti Virus Version

More information

INFORMATION WE MAY COLLECT FROM YOU

INFORMATION WE MAY COLLECT FROM YOU Privacy Policy ABOUT Prolific Academic Ltd. ("We") are committed to protecting and respecting your privacy. This policy (together with our terms of use and any other documents referred to on it) sets out

More information

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,

More information

The potential legal consequences of a personal data breach

The potential legal consequences of a personal data breach The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.

More information

PINELAND TELEPHONE COOPERATIVE DSL SERVICE AGREEMENT

PINELAND TELEPHONE COOPERATIVE DSL SERVICE AGREEMENT PINELAND TELEPHONE COOPERATIVE DSL SERVICE AGREEMENT Check Plan: Residential Business Installation Cost $45.00 $62.00 Check Plan: 256 Down/128 Up $24.95 $44.95 Monthly 1.544 Down/256 Up $39.95 $49.95 Monthly

More information